General

  • Target

    92796e61f7a47521210edfc5e7e2004975ede13b836787b07dde85f80750b0ff

  • Size

    136KB

  • MD5

    41db0c2202d64e967fd6789f00c576fa

  • SHA1

    9dfce70fded4f3bc2aa50ca772b0f9094b7b1fb2

  • SHA256

    92796e61f7a47521210edfc5e7e2004975ede13b836787b07dde85f80750b0ff

  • SHA512

    d2624e7a1dbeeab9c47f682389f5244ecc703dbf9cd351e2ffa0b1b79fe786fb533416609cd386c44c5f3e89f38140898a4dbc2af0a308f10987cc3c5ec085ba

  • SSDEEP

    3072:olpExZNVsO3kzmjgmhwaDOJS11AD6UpkZrL:8EX3T3kzbmm5JSBBF

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 92796e61f7a47521210edfc5e7e2004975ede13b836787b07dde85f80750b0ff
    .dll windows x86

    c8f9c880fd1a2b819edd0e5bca929f29


    Code Sign

    Headers

    Imports

    Exports

    Sections